Letteratura scientifica selezionata sul tema "Computer security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Computer security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Computer security"
Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (June 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Testo completoKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Testo completoSchmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (September 1, 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Testo completoAlkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (January 30, 2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.
Testo completoWhite, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (February 1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.
Testo completoLincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (August 26, 1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.
Testo completoGlīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.
Testo completoMercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (October 2002): 11–14. http://dx.doi.org/10.1145/570907.570917.
Testo completoDwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (October 1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.
Testo completoLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (August 2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Testo completoTesi sul tema "Computer security"
Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.
Testo completoPohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Testo completoBurchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Testo completoBesada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.
Testo completoMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Testo completoTaramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.
Testo completoSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Testo completoLomas, Thomas Mark Angus. "Aspects of computer network security." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.
Testo completoSoewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Testo completoLi, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.
Testo completoLibri sul tema "Computer security"
Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
Cerca il testo completoW, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Cerca il testo completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Cerca il testo completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Testo completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Testo completoFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Testo completoLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Testo completoLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Testo completoBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Testo completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, and Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Testo completoCapitoli di libri sul tema "Computer security"
Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons, 147–205. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6189-7_5.
Testo completoParker, Carey. "Computer Security." In Firewalls Don't Stop Dragons, 147–218. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3852-3_5.
Testo completoWilson, Kevin. "Computer Security." In Everyday Computing with Windows 8.1, 113–19. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0805-2_24.
Testo completoSchneier, Bruce. "Computer Security." In Secrets and Lies, 120–34. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch8.
Testo completoHelfrich, James. "Computer Security." In Security for Software Engineers, 2–5. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.
Testo completoDuffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials, 3–20. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.
Testo completoBell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Computer Security." In Cybersins and Digital Good Deeds, 33–34. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-17.
Testo completoCrutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Computer Security." In Essential Computer Science, 165–94. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_6.
Testo completoAshley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security, 45–59. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.
Testo completoLefebvre, E. "Computer Network Security." In Multisensor Fusion, 765–78. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.
Testo completoAtti di convegni sul tema "Computer security"
Lin, Hongkai. "Computer network information security monitoring system." In Second International Conference on Big Data, Computational Intelligence and Applications (BDCIA 2024), edited by Sos S. Agaian, 161. SPIE, 2025. https://doi.org/10.1117/12.3059895.
Testo completoHowerton, Paul W. "Computer security." In the 1985 ACM annual conference. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/320435.320579.
Testo completoValentine, David W. "Practical computer security." In the 6th conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1095714.1095758.
Testo completoNanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3258155.
Testo completoTurner, Claude F., Blair Taylor, and Siddharth Kaza. "Security in computer literacy." In the 42nd ACM technical symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953174.
Testo completo"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.
Testo completoGuizani, M., and Hsiao-Hwa Chen. "Computer & network security." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578354.
Testo completoCampbell, Marlene. "Ethics and computer security." In the 1988 ACM sixteenth annual conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/322609.322781.
Testo completo"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.
Testo completoCostello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. New York, New York, USA: ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.
Testo completoRapporti di organizzazioni sul tema "Computer security"
Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.
Testo completoSECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Fort Belvoir, VA: Defense Technical Information Center, September 1997. http://dx.doi.org/10.21236/ada404996.
Testo completoTodd, Mary Anne, and Constance Guitian. Computer security training guidelines. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.
Testo completoBerg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1034885.
Testo completoFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.
Testo completoSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Fort Belvoir, VA: Defense Technical Information Center, August 2001. http://dx.doi.org/10.21236/ada405011.
Testo completoBergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Fort Belvoir, VA: Defense Technical Information Center, October 1988. http://dx.doi.org/10.21236/ada203261.
Testo completoGuttman, Barbara, and Edward Roback. An introduction to computer security :. Gaithersburg, MD: National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.
Testo completoRoback, Edward. Glossary of computer security terminology. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4659.
Testo completoSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.
Testo completo